Posture Check to allow Azure AD joined domains.
When using the posture check to see if a device is “domain joined” it does not work for devices that are joined to Azure AD.
However we can search based on Regex Path, as Azure AD joined devices will have the following path:
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CloudDomainJoin\TenantInfo\ {TENANT_ID}\
Create a new device posture profile (Administration > Device Posture), then select the following:
- Posture Type: Registry Key
- Registry Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CloudDomainJoin\TenantInfo\ {TENANT_ID}\
- Match Type: Path
Once configured, this can be applied to ZPA policies.
Non-Azure AD Joined:
By typing “dsregcmd /status”, you can see what the device status is - which in this case is not joined to Azure AD or any other domain.
We can also look at the registry to confirm there is no entry.
This means when this device goes via ZPA it will not be able to pass this posture check. This can be viewed from the diagnostics page under the “User Meta Data”
Then you can view the device posture. In this case it’s not verified.
Azure AD Joined:
By using a device joined to Azure AD we can see different results.
Output from “dsregcmd /status” - which shows its only Azure AD joined.
When I view the logs from ZPA, I can see that the Reg Key posture check is valid for the Azure AD joined device.